Workplace Mobility Report - for Small and Mid-size Business - T-Mobile

Page created by Ronald Burke
 
CONTINUE READING
Workplace Mobility Report - for Small and Mid-size Business - T-Mobile
1

2021

Workplace
Mobility Report
  for Small and Mid-size Business
Workplace Mobility Report - for Small and Mid-size Business - T-Mobile
INTRODUCTION   THE HYBRID WORKFORCE   MOBILE SECURITY    5G APPLICATIONS   GET READY   2

00 01 02
   Introduction           The hybrid workforce                               Strengthening
                                                                             mobile security

03 04
Connecting with 5G                  Get ready
Workplace Mobility Report - for Small and Mid-size Business - T-Mobile
INTRODUCTION                               THE HYBRID WORKFORCE   MOBILE SECURITY   5G APPLICATIONS   GET READY   3

Introduction

        Introduction
        While the events of 2020 may have accelerated the adoption of new remote work practices,
        many business leaders have since realized the model has its advantages.

        After more than a year of transitioning to remote work, 83% of employers now say the shift
        has been successful for their business, versus 73% in June 2020.1 Moving forward, 90% of
        businesses think it’s likely or highly likely that more of their workers will work from home.2

        Among Small and Midsize Business (SMB) decision makers in particular, 57% who increased
        remote working as a result of social distancing will likely maintain this work model for
        employees’ long term.3 The result is a hybrid workplace, where workers who are located in
        the same physical space collaborate with employees who work remotely or in the field.

        The hybrid model promises many benefits. With remote work comes increased flexibility,
        employee satisfaction, reduced carbon footprint, and reductions in real estate costs. While
        working at the same location provides the advantage of face-to-face collaboration and
        informal networking in an office or store, bringing these two environments together could
        prove to be a very productive combination for some businesses.

        This new way of work will necessitate a true mobility-focused business model, as employees
        move between multiple work locations from home, in the office, or in the field—with
        their devices seamlessly shifting with them. The challenge for IT will be ensuring equal
        technology, information, and network access among all employees, regardless of location.

        1
          “It’s time to reimagine where and how work will get done,” PWC’s U.S. Remote Work Survey, January 2021.
        2
          “Mobile Workers will be 60% of the Total U.S. Workforce by 2024,” IDC, September 2020.
        3
          “New Study Finds More than Half of U.S. SMB Owners Believe Working Remotely is Here to Stay Post-Pandemic,” Intermedia Cloud Communications, March 2020.
Workplace Mobility Report - for Small and Mid-size Business - T-Mobile
INTRODUCTION                               THE HYBRID WORKFORCE                                              MOBILE SECURITY                                   5G APPLICATIONS             GET READY   4

Adopting a digital technology business model can help SMBs have an immediate
impact on their bottom line. Businesses can eliminate the cost of physical equipment
                                                                                                                                                                                                     01                                A new hybrid mobile workforce is
                                                                                                                                                                                                                                       redefining the business environment

and the time it takes to manage it and experience the added security benefit that
comes from moving operations to the cloud. As SMBs combine these benefits with

                                                                                                                                                                                                     02
access to robust collaborative tools that drive productivity, they can increase their
agility and boost resilience as they look to the future.4                                                                                                                                                                              The shift to mobile workforces
This report will discuss key trends and insights that small business leaders and IT                                                                                                                                                    intensifies the need for mobile security
professionals can leverage to ensure a smooth, secure, and productive transition to
the hybrid workplace. We’ll explore trends changing the way we work, security best
practices, and the role of 5G.

                                                                                                                                                                                                     03                                5G is bridging the connectivity gap for
                                                                                                                                                                                                                                       remote workers

4
    “The Top 5 Digital Transformation Trends in 2021 for Small and Mid-size Businesses,” Forbes, January 2021.
5G: Capable device required; coverage not available in some areas. While 5G access won’t require a certain plan or feature, some uses/services might. See Coverage details, Terms and Conditions, and Open Internet information for network management details (like video optimization) at T-Mobile.com.
Workplace Mobility Report - for Small and Mid-size Business - T-Mobile
INTRODUCTION   THE HYBRID WORKFORCE       MOBILE SECURITY   5G APPLICATIONS   GET READY   5

Trend 01

       Trend 01:
       A new hybrid mobile
       workforce is redefining
       the business environment
       Studies have shown that the trend toward remote work will continue.

       An SMB Group study conducted in July 20205 shows that in the wake of the pandemic:
       •	67% of businesses surveyed had established work-from-home programs for the first time or had expanded modest
          work-from-home programs put in place prior to COVID-19.

                                                                                                                                          “
       •	52% said the work-from-home program had significantly or somewhat improved employee productivity, while 31% said it
          had no impact. Going forward, 57% say they plan to increase budgets to better equip employees who work from home.
       •	As of January 2021, an estimated half of the current U.S. workforce worked remotely, with three to five saying they want            57% [of small businesses] say they plan
          to continue doing so. By 2024, 22% of the entire U.S. workforce, or 34 million workers, will work from home or remotely.
       •	Even as closures are lifted, U.S. companies expect employees to work from home three or more days a week, evolving
                                                                                                                                              to increase budgets to better equip

                                                                                                                                                                                   ”
          into a hybrid mobile workforce that can shift from home, to office, to in-the-field locations with the same level of network
          and data access.6
                                                                                                                                              employees who work from home.

       5
         “SMBs: Navigating a Path Forward,” SMB Group, 2020.
       6
         “It’s time to reimagine where and how work will get done,” PWC, January 2021.
Workplace Mobility Report - for Small and Mid-size Business - T-Mobile
INTRODUCTION              THE HYBRID WORKFORCE   MOBILE SECURITY   5G APPLICATIONS   GET READY   6

The trend toward flexibility
The evolving workforce environment has compelled small business owners and leaders to
rethink their mobile workforce models and the policies that govern how, where, and when
employees work. Organizations are beginning to allow employees to choose whether to
work from home or somewhere else, based on position roles. For example, work-from-home
arrangements may better suit workers who typically operate out of an office versus field
technicians or in-store sales associates.

For those eligible to work from home, analyst firm Gartner, Inc. advocates for “radical flexibility,”
where employees have a choice over not only where they work but also when and how much
they work.7 Their research indicates that, on average, an organization reports that 36% of their
employees are high performers. For organizations that offer flexibility in where, when, and how
much employees work, that number jumps to 55%.

7
    “The New Employment Deal,” Gartner, 2020.
Workplace Mobility Report - for Small and Mid-size Business - T-Mobile
INTRODUCTION   THE HYBRID WORKFORCE          MOBILE SECURITY             5G APPLICATIONS             GET READY   7

                                                                                                                While hybrid workplaces promise several benefits, they also introduce
                                                                                                                challenges, with remote workers potentially feeling less “in the loop” and being
                                                                                                                deprioritized in terms of access to collaboration tools and IT support. Office-
                                                                                                                based workers typically have had better access to more systems and tools and
                                                                                                                more visibility within their organizations than their remote colleagues. This may
                                                                                                                be compounded by a difference in technology support between those who
                                                                                                                work from home and those who work on-premises.

                                                                                                                Previously, employees who worked from home dealt with weaker technological
                                                                                                                setups and infrastructure, such as slow connections and the inability to access
                                                                                                                certain resources on the network, making it more difficult to demonstrate their
                                                                                                                competence and demonstrate productivity levels equal to or better than in-
                                                                                                                office productivity.8 Some IT leaders have recognized their role in eliminating
                                                                                                                the connectivity gap, offering remote and on-premise workers equal priority to
                                                                                                                enable secure access to corporate data and applications.

                                                                                                                SMBs will need to adopt and support broad hybrid working models where
                                                                                                                remote and on-premise workers receive equal priority with IT when it comes to
                                                                                                                enabling secure access to corporate data.

8
    “Managing the Hybrid Workplace Fair,” Harvard Business Review, February 2021.
Workplace Mobility Report - for Small and Mid-size Business - T-Mobile
INTRODUCTION   THE HYBRID WORKFORCE   MOBILE SECURITY   5G APPLICATIONS   GET READY   8

Trend 02

       Trend 02:
       The shift to mobile
       workforces intensifies the
       need for mobile security

           “
           In 2020, more than 60% of small to mid-size

                                                                             ”
           businesses experienced a cyberattack.
           ― “Overcoming the Challenges of Mobilizing Workforces,”
              IDS, January 2021.
Workplace Mobility Report - for Small and Mid-size Business - T-Mobile
INTRODUCTION   THE HYBRID WORKFORCE   MOBILE SECURITY   5G APPLICATIONS   GET READY   9

According to IDC, security is ranked as the
top challenge organizations struggle with
when mobilizing their workforce.
Last year, more than 60% of small to mid-size businesses experienced a
cyberattack; 83% of companies impacted lacked the budget to deal with the
repercussions, with 60% of those going out of business.9

Cybercriminals took advantage of the shift to remote work in 2020, targeting
vulnerabilities and companies that hadn’t invested in proper cyber security
protection. Nearly 25% of organizations absorbed unexpected costs related to
security breaches and malware attacks in 2020.10

9
  “Overcoming the Challenges of Mobilizing Workforces,” IDC, 2021.
10
   “Top Security Trends for 2021 (and What They Mean for You),” Security Boulevard, 2021.
Workplace Mobility Report - for Small and Mid-size Business - T-Mobile
INTRODUCTION         THE HYBRID WORKFORCE                 MOBILE SECURITY             5G APPLICATIONS           GET READY                  10

                                                                               The most common security threats facing small and
                                                                               mid-sized businesses with a mobile workforce include:
                                                                                                                                     Man in the Middle                 Distributed Denial of Service
                                                                                                   Phishing Attacks                                                                                      Ransomware Attacks
                                                                                                                                     (MitM) Attacks                    (DDoS) Attacks

                                                                                                   Trolling, identity theft,
                                                                                                                                     Network attacks, Wi-Fi            Botnet attacks, traffic floods,   Encryption ransoms,
                                                                               Also known as:      bogus emails, email spoofing,
                                                                                                                                     spoofing, IP spoofing             zombie network attacks            CryptoWalls
                                                                                                   social engineering

                                                                                                                                                                       A popular choice for hackers
                                                                                                   Scam artists target individuals
                                                                                                                                     Network attacks use fake          interested in corporate or
                                                                                                   in organizations via fake                                                                             A type of malware that locks
                                                                                                                                     network access points to          economic sabotage, these
                                                                                                   emails, messages, and                                                                                 systems and data behind a
                                                                               What it is:                                           intercept internet traffic and    attacks involve attempts to
                                                                                                   websites containing malicious                                                                         paywall until the hacker’s
                                                                                                                                     access private data, then pass    crash a targeted network by
                                                                                                   threats in order to get                                                                               ransom is paid.
                                                                                                                                     it onto the intended recipient.   bombarding it with requests
                                                                                                   personal information.
                                                                                                                                                                       using malware-infected devices.

                                                                                                   More than 95% of successful       95% of HTTPS servers are          Hackers aren’t just targeting
                                                                                                   attacks and data breaches         vulnerable to network attacks.    large companies anymore.          Ransoms mean suffering
                                                                                                   begin with a phishing scam.       Because these attacks             In 2017, 20% of targets were      damaging downtime or
                                                                                                   This is the easiest way for       expose your raw data to           micro businesses and 33% were     significant, immediate financial
                                                                               The risk to SMBs:
                                                                                                   a hacker to get malware or        hackers, the financial and        small to midsize businesses.      loss, or both. The average
                                                                                                   ransomware into your              operational damage that can       DDoS attacks can cause nearly     ransomware payment was
                                                                                                   company network, or to            be done to your business is       unlimited potential revenue       more than $111,000 in 2020.11
                                                                                                   steal sensitive data.             virtually limitless.              losses due to services outages.

11
     “24 Alarming Cybercrime Statistics for 2021,” Broadband Research, 2021.
INTRODUCTION    THE HYBRID WORKFORCE              MOBILE SECURITY          5G APPLICATIONS            GET READY                11

More common security threats to SMBs                                                                                                                                            Mobile Device Management
                                        Business Email Compromise /                                                                                                             A key component of mobile security plans includes a mobile device
                                                                                                    Direct Hacking                       Malware and Viruses
                                        Cryptojacking                                                                                                                           management (MDM) solution. MDM cost effectively simplifies the challenges
                                                                                                                                                                                and security risks of managing a mobile workforce by monitoring, managing,
                                        Cryptomining malware,                                       Cyberbreaches, brute force                                                  and securing mobile devices—such as smartphones, tablets, and laptops—
 Also known as:                                                                                                                          Trojan Horses, spyware, worms          that are used to access company data. Some of the key benefits include:
                                        stealth mining                                              attacks

                                        Cryptomining malware runs
                                        silently in the background of
                                                                                                    A hacker uses malicious
                                                                                                                                         Malware and viruses are
                                                                                                                                         malicious computer programs
                                                                                                                                                                                1   Security. MDM solutions increase security by tracking and managing
                                                                                                                                                                                    every mobile device within a business’s network. They incorporate
                                                                                                                                                                                    mobile threat detection capabilities and provide visibility, tracking,
                                                                                                    software or brute force attacks
                                        an infected device through                                                                       often sent via email that, when            managing, and policy controls. This gives administrators the ability
 What it is:                                                                                        to gain unauthorized access to
                                        legitimate apps and gets a                                                                       clicked or opened, give hackers            to tie Corporate Security Policies directly into the management of
                                                                                                    secure data through a user’s
                                        hold of a computer’s                                                                             full access to an organization’s           mobile devices.
                                                                                                    account.
                                        processing power.                                                                                private data.

                                        SMBs are prime targets                                      More than 155.8 million
                                                                                                                                                                                2   Control. MDM can control remote access to highly sensitive data,
                                                                                                                                                                                    provide user authentication, and can remotely locate, lock, and wipe
                                                                                                                                                                                    lost or stolen mobile devices.
                                        because of their limited ability                            individuals were impacted
                                                                                                                                         The impact of malware and
                                        to track and detect spikes in                               by data exposures in 2020.12
 The risk to SMBs:                      workstation activity. Once “in,”
                                        the malware can significantly
                                                                                                    Successful attacks cause
                                                                                                    service downtime, fines from
                                                                                                                                         viruses can range from network
                                                                                                                                         and device downtime to large-
                                                                                                                                         scale data loss.
                                                                                                                                                                                3   Proactive Threat Management. With MDM, IT can establish protocols
                                                                                                                                                                                    to direct actions in the event of a suspected security threat.
                                        impact employee productivity                                regulators, and extortion from
                                        and workstation performance.                                groups holding sensitive data.
                                                                                                                                                                                4   Cost Effective. MDM can also save companies money because it
                                                                                                                                                                                    allows for a bring-your-own-device (BYOD) policy since IT can also
                                                                                                                                                                                    manage and secure these devices. Savings come in the form of the
                                                                                                                                                                                    employee vs. the company paying for the device.
SMBs must take a zero-trust mentality to guard against potential threats. This means embracing a proactive approach to
how they monitor the people, systems, and services that use their networks.

      12
           “Annual number of data breaches and exposed records in the United States from 2005 to 2020,” Statista, 2021.
INTRODUCTION                   THE HYBRID WORKFORCE                 MOBILE SECURITY          5G APPLICATIONS             GET READY               12

Best practices in security policies:                                                                                                         Four key forms of
                                                                                                                                             security for SMBs
Rules for authentication and                                         Collaboration app security
credential storage                                                   Video conferencing has become a collaboration workhorse of the
                                                                                                                                             As SMBs review their cybersecurity needs, they should evaluate
For example, small and midsize companies are moving to               hybrid workplace, and companies need to ensure these tools are
                                                                     secure too, partially by vetting and choosing collaboration tools
                                                                                                                                             options that provide four critical types of protection:
multifactor authentication (MFA), which requires two or more
identity-driven credentials to grant access to applications.         with solid security performance.

Password/PIN/device restrictions                                     Cyberattack prevention
                                                                                                                                            1     Perimeter protection: a firewall that protects the company
                                                                                                                                                  network, systems, and data from external threats (malware, viruses,
                                                                                                                                                  and more). This is extremely important for SMBs, which are more
                                                                     While phishing emails are neither new nor unique to the hybrid
or limitations                                                       workplace, bad actors can take advantage of heightened fears and             inclined to use the internet as their primary business network versus
Some small businesses are requiring employees to use strong                                                                                       an enterprise-controlled data center at HQ.
                                                                     anxieties. Companies are reminding employees to remain cautious
passwords (long, unique passwords with a mix of characters). Many
                                                                     of downloading random applications and opening attachments
are also establishing policies regarding home routers, computers
and software being consistently updated to the latest versions and
operating systems updated to include the latest security patches.
                                                                     from unknown senders.
                                                                                                                                            2     Private network access: provides secure access to specific
                                                                                                                                                  company apps and data to those who need it without opening the
                                                                                                                                                  entire network.
                                                                     Threat detection and response
Virtual Private Networks                                             Threat detection and response solutions automate monitoring
Many companies are beefing up network security by requiring
employees who work remotely to use Virtual Private Networks.
                                                                     and the collection of data from multiple IT security tools. These
                                                                     solutions are becoming more sophisticated, applying artificial
                                                                     intelligence and machine learning to decision-making across a
                                                                                                                                            3     Monitoring and remediation: proactively searches smartphones,
                                                                                                                                                  tablets, PCs, and servers for threats, quickly detecting issues and
                                                                                                                                                  providing remediation through Mobile Device Management (MDM).
This helps maintain end-to-end data encryption and safeguards
                                                                     broad range of security operations.
the business against vulnerabilities that may arise if employees
neglect to keep routers up to date with the latest software and
security patches.                                                                                                                           4     Mobile device protection: allows company employees to be
                                                                                                                                                  protected regardless of how or where they access the internet.
INTRODUCTION                                 THE HYBRID WORKFORCE                                              MOBILE SECURITY                                   5G APPLICATIONS             GET READY   13

Trend 03

        Trend 03:
        5G is bridging
        the connectivity
        gap for remote
        workers
        Given the trend toward remote and hybrid work, business
        and IT leaders are prioritizing budget allocation to support
        the shift. According to a study by PwC, 72% of business lead-
        ers are planning new investments in tools enabling virtual
        collaboration and 70% plan to increase investment in IT infra-
        structure to secure virtual connectivity.13 5G has emerged at
        the perfect time to meet the needs of the mobile workplace.

       13
         “It’s time to reimagine where and how work will get done,” PWC, January 2021.
        5G: Capable device required; coverage not available in some areas. While 5G access won’t require a certain plan or feature, some uses/services might. See Coverage details, Terms and Conditions, and Open Internet information for network management details (like video optimization) at T-Mobile.com.
INTRODUCTION                                 THE HYBRID WORKFORCE                                              MOBILE SECURITY                                   5G APPLICATIONS             GET READY   14

                                                                                                                                                                                       5G is here
                                                                                                                                                                                       While 2020 saw the adoption of 5G within limited geographies, 2021 has fully ushered in
                                                                                                                                                                                       the era of 5G, with nationwide coverage and networks that provide significant speed and
                                                                                                                                                                                       capacity advantages over 4G LTE.

                                                                                                                                                                                       5G offers compelling near-term advantages for SMBs, particularly in enhanced
                                                                                                                                                                                       mobile broadband that provides a higher data access rate across a wide coverage area.

                                                                                                                                                                                                 Speed and cost improvements
                                                                                                                                                                                                 5G’s enablement of mobile broadband supports mobile workers and work-from-home employees by
                                                                                                                                                                                                 significantly improving download speeds while potentially offering more cost-efficient data transfers.

                                                                                                                                                                                                 Reliable performance in and out of the office
                                                                                                                                                                                                 5G provides mobile workers with connectivity performance comparable to in-office workers, helping
                                                                                                                                                                                                 to reduce the lag that managers fear may impact productivity among employees.

                                                                                                                                                                                                 Easy, inexpensive solutions for small and branch offices
                                                                                                                                                                                                 5G has brought about a lot of awareness of Fixed Wireless Access (FWA) and internet service
                                                                                                                                                                                                 delivered wirelessly to a home or business. While FWA isn’t new, 5G makes it particularly relevant
                                                                                                                                                                                                 for the growing base of mobile and work-from-home employees and a cost-efficient alternative to
                                                                                                                                                                                                 smaller offices where employees or field reps only work periodically.

5G: Capable device required; coverage not available in some areas. While 5G access won’t require a certain plan or feature, some uses/services might. See Coverage details, Terms and Conditions, and Open Internet information for network management details (like video optimization) at T-Mobile.com.
INTRODUCTION                                THE HYBRID WORKFORCE                                             MOBILE SECURITY                         5G APPLICATIONS                  GET READY               15

Companies are already putting 5G to work.
Popular use cases for 5G:

High-Bandwidth Mobile App                                                                                              Fixed Wireless Access
Mobile apps like high-definition telepresence, video collaboration,                                                    Fixed wireless access is a high-speed alternative to tradition ISP
and real-time data backup require high-bandwidth connectivity.                                                         service options. It’s attractive for home-based workers and for rural
This is particularly relevant to a more distributed workforce that is                                                  broadband access, temporary data access, and wireless secondary
consistently backing up data and files to the cloud.                                                                   access. T-Mobile offers WFX Solutions for SMBs looking to enable
                                                                                                                       their remote workforces with separate, reliable, high-speed internet
Benefit: High-speed connectivity keeps workers productive regardless
                                                                                                                       connectivity while allowing IT to maintain control of business-critical
of location.
                                                                                                                       applications and filter out non-business content. The solution also
                                                                                                                       delivers the tools to collaborate more effectively and to tap into
High Bandwidth for Surveillance                                                                                        Unlimited usage plans to ensure cost predictability.
High bandwidth is required for closed-circuit television (CCTV)                                                        Benefit: Fixed wireless access provides remote workers and rural
and drone surveillance. Companies using drones or unmanned                                                             offices secure wireless connectivity with cost predictability.
aerial vehicles (UAVs) for everything from delivery and real estate                                                                                                                                                                               The list of possible 5G applications is endless, with many SMBs
photography to surveillance and training.                                                                                                                                                                                                         looking forward to improving operations across asset tracking
Benefit: SMBs can benefit from the myriad of IoT devices coming                                                        AR/VR                                                                                                                      and management, fleet management, driver safety, connected
to market, each with unique applications and value, from increasing                                                    AR/VR is used for immersive employee training and training                                                                 equipment, and smart meters, among other applications.
worker safety to improving marketing capabilities.                                                                     gamification. Simulations using AR/VR require high bandwidth and low
                                                                                                                       latency to operate effectively.                                                                                            In the future, 5G is poised to bring future advantages to SMBs, for
                                                                                                                                                                                                                                                  example supporting critical IoT applications requiring low latency and
                                                                                                                       Benefit: AR/VR provides many benefits, most often employed in
                                                                                                                                                                                                                                                  ultra-reliability.
                                                                                                                       employee training in business settings. AR/VR can help simulate on-
                                                                                                                       the-job scenarios, from customer interactions to complex and detailed
                                                                                                                       technical operations.

During congestion, heavy data users (>50GB/mo. for most plans) and customers choosing lower-prioritized plans may notice lower speeds than other customers; see plan for details. 5G: Capable device required; coverage not available in some areas.
While 5G access won’t require a certain plan or feature, some uses/services might. See Coverage details, Terms and Conditions, and Open Internet information for network management details (like video optimization) at T-Mobile.com.
INTRODUCTION                                 THE HYBRID WORKFORCE                                              MOBILE SECURITY                                   5G APPLICATIONS             GET READY   16

Get ready for the new hybrid workforce
Successfully negotiating the logistics of a new hybrid workforce, with some workers in the office, others
remote, and others in the field—with a high likelihood that there will be a combination of all of these—will be
key for SMBs in 2021 and beyond.

IT, operations, and company leadership will need to tackle this new business model head-on to
keep employees productive, customers happy, and the company competitive. Within the third quarter of 2021,
75% of business leaders anticipate at least half of their workforce will be back onsite.14 SMBs can’t afford to
wait to support the evolving work environments.

Business leaders can help ease the transition now by developing a strategy for keeping workers connected and
productive regardless of location. This will ensure each employee has equal access to essential data, files, and
high-speed connectivity. 5G delivers the speed, coverage, and capacity that SMBs need for enabling mobile
workforces as well as innovative solutions for customers.

Security needs to be moved to the front of the line when it comes to supporting a mobile workforce. Ignore
it, and you place your business at risk. IT and small business leaders need to review and beef up their existing                                                                                                             Regardless of the makeup of the hybrid workforce, a mobile-first approach will
security policies, take advantage of solutions such as Mobile Device Management, and adopt security best                                                                                                                     help every company be more competitive, connected, and collaborative. Making
practices such as multifactor authentication and virtual private networks at a minimum.                                                                                                                                      changes now can bring SMBs immediate benefits and advantages stemming
                                                                                                                                                                                                                             from a freely mobile and agile business.

14
     https://www.pwc.com/us/en/library/covid-19/us-remote-work-survey.html#content-free-1-4e16
5G: Capable device required; coverage not available in some areas. While 5G access won’t require a certain plan or feature, some uses/services might. See Coverage details, Terms and Conditions, and Open Internet information for network management details (like video optimization) at T-Mobile.com.
17

Ready to give your business a mobile-first advantage? T-Mobile for Business is ready to help. Let’s talk. 1-877-511-6719
You can also read